SlideShare a Scribd company logo
BILL BURNS, SR. DIR OF PRODUCT DEVELOPMENT & PRODUCT MANAGER, TOTALVIEW
STUART FOSTER, PRODUCT MANAGER, PERFORCE STATIC APPLICATION SECURITY TESTING (SAST)
Efficient Security
Development and
Testing Using
Dynamic and Static
Code Analysis
perforce.com2 | © Perforce Software, Inc.
Minimize your software risks by identifying and eliminating security vulnerabilities as
early as possible to ensure that your code is safeguarded against potential threats.
1
2
3
Secure Development Tools SAST/DAST
Secure Development Practices and Minimizing Risk
Testing, Vulnerability Remediation, and Validation Techniques
4 DevSecOps – Bake Security into your SDLC
Today’s Agenda
Secure Development Tools SAST/DAST
perforce.com4 | © Perforce Software, Inc.
Known as white box testing, SAST allows developers to find security vulnerabilities in application source
code early in the SDLC. The tool also helps enforce coding guidelines and standards throughout the
development life-cycle.
What do SAST tools test?
• The tools tools test the source code, byte code, and binaries line-by-line, to expose weaknesses in the
software before it is deployed.
• By detecting coding violations early in development weaknesses can be fixed before attackers detect them
and they become true vulnerabilities in production software.
What is Static Application Security Testing (SAST)?
perforce.com5 | © Perforce Software, Inc.
• Finds issues by looking for known vulnerability patterns for industry coding standards
for security, safety, and quality
• Speed & cost of remediation is faster/cheaper because of early detection
• Shift-Left approach – analysis available everywhere; on desktop, within CI/CD pipelines,
and during integration builds
• Easy to automate, scalable and provides highest levels of code coverage
• Feedback is fast and provides exact location of vulnerabilities, help and reports
Advantages of Static Application Security Testing (SAST)
perforce.com6 | © Perforce Software, Inc.
Known as black box testing, DAST allows developers to find security vulnerabilities and weaknesses in
a running application. The tool allows developers to find and validate issues present in pre-and-post-
production code.
What do DAST tools test?
• The tool tests running code to detect issues with interfaces, APIs, scripting, data injection,
authentication, and more by using a variety of dynamic analysis capabilities and techniques
including: live memory usage and error checking, live and test application recording, and fuzzing
techniques to throw invalid and unexpected test cases at the application.
• DAST can find runtime problems that can't be identified by Static Analysis – issues outside of the
code within third-party interfaces, environment, or configuration issues.
What is Dynamic Application Security Testing? (DAST)
perforce.com7 | © Perforce Software, Inc.
Advantages of Dynamic Application Security Testing (DAST)
• Analyze the whole application while it
is running
• “Look inside” the application and dynamically
analyze execution logic and live data
• Highlights authentication and server
configuration issues
• Language and Source Code independent
• Checks memory consumption and resource use
• Attempts to break encryption algorithms
from outside
• Verifies permissions to ensure isolation of
privilege levels
• Checks for cross-site scripting, SQL injection,
and cookie manipulation
• Tests for vulnerabilities in third-party interfaces
• Understands arguments and function calls
• Record application execution for post-mortem
test failure analysis
• Catch hard application failures
• Unattended script based dynamic analysis
Secure Development Practices and Risk Reduction
perforce.com9 | © Perforce Software, Inc.
Build Security into your SDLC
• Follow Secure Coding Standards
• Enforce Security Compliance using Tools
• Using both SAST/DAST tools together
should be part of every effective security program.
• Provide Security Training & Learning for your teams
• Incorporate security scanning into your development lifecycle
Secure Software Development Practices
Plan Code Build Test Release Deploy Operate Monitor
SAST
DAST
perforce.com10 | © Perforce Software, Inc.
Minimize Security Risks
DASTSAST
Code Written
Code Submitted
Analyses for Secure
Coding Issues
Tests for Security Issues
Validates SAST Issues
Pass, or
Issues Deferred
Pass, for Release
Fail, and Report Issues
Remediate /
Fix Issues
Synthesize / Correlate Data from Tools
SAST – Detects vulnerabilities and lists severity of issues found
DAST – Validates SAST findings, informs further prioritization, uncovers run-time issues
As part of an effective security program both SAST and DAST should be used together. DAST tools can be used to identify
valuable SAST rules to enforce and help prioritize the vulnerability backlog when dealing with existing production code.
SAST can be used to uncover issues pre-production and new development on existing code with DAST complimenting
the validation and verification checks before a product is released.
Testing, Vulnerability Remediation,
and Validation Techniques
perforce.com12 | © Perforce Software, Inc.
1. Klocwork Scan of git source
code reveals an “Unvalidated
integer value ‘len’” error.
2. Variable len is set on line 178
and then used on line 180.
3. Help from KW explains
problem and suggested
resolutions.
• This could result in a buffer
overrun of buffer “input”.
• Use Dynamic Analysis to analyze
and confirm the fix.
Static/Dynamic Analysis Example – Klocwork Analysis
2
3
1
perforce.com13 | © Perforce Software, Inc.
Static/Dynamic Analysis Example – TotalView Analysis
perforce.com14 | © Perforce Software, Inc.
• Several Dynamic Analysis/DAST tools may be needed to provide full coverage
• TotalView provides more than just interactive debugging
• Reverse Debugging enables one-session recording, analysis, resolution and ability to save recording files
• Memory debugging to find memory leaks and other heap memory errors
• TotalView can be fully scripted and run in an unattended mode
• Ideal for integration into CI environments
• Supports reverse debugging and memory debugging technologies
• Catch application crashes and save off core files and reverse debugging recording files
• Compare test results against baselines to validate platform, compiler and toolkits
TotalView Dynamic Analysis Capabilities
DevSecOps
Bake Security into Your SDLC
perforce.com16 | © Perforce Software, Inc.
• Creating a secure Software Development Life Cycle (sSDLC) is one of the best ways to enforce development best practices.
• Ensuring development velocity while delivering secure code is possible when application security testing is built into the
DevOps workflow.
The most efficient and effective solution is to use Dynamic and Static Code Analysis for
application security testing within DevSecOps pipelines.
• Incorporating a shift-left approach into DevOps means integrating AST tools early and running often throughout the
development process.
• By continuously monitoring and enforcing security compliance you can;
• Use SAST/DAST to find vulnerabilities and threats in your code
• Perform pre-commit, commit, build integration, testing, and production checks throughout your entire development pipeline
• Receive reports on issues and correlate data to make informed decisions to prioritize and mitigate risks in your code
DevSecOps
perforce.com17 | © Perforce Software, Inc.
Example CI/CD Workflow
Application Security Testing
S E E A L I V E D E M O AT
perforce.com/products/klocwork/live-demo
S E E A D E M O AT
totalview.io/demo
perforce.com19 | © Perforce Software, Inc.
• Find Security, Quality and Reliability defects early in the SDLC – Reduce costs and limiting production defects
• Enforce security, quality or safety standards
• Shift-Left Defect Analysis – Desktop, CI/CD, Server
• Provide detailed defect information and remediation help & best practices
• Recommendation engine that helps identify and prioritize issues based on severity of risk
• Command, Control and Collaboration – Monitor Projects, Manage Defects, Report and Track Project Status
• DevOps/DevSecOps – Supports Containers, CI/CD, Cloud Services, Provisioned instances, REST APIs
• Accelerate development velocity and delivery cycles
• Certified tool for compliance and functional safety development
• Enterprise at scale – Large Code bases, Multi-Language Support, Support for Thousands of developers, Broad Toolset Integrations
How Klocwork Can Help
Learn more at perforce.com/klocwork
perforce.com20 | © Perforce Software, Inc.
• Dynamically analyze your code to understand how it actually runs and generates data
• Use reverse debugging to go backwards and forwards in your code during one
analysis and debugging session
• Leverage evaluation points to add hot-patches to your code and validate a fix
without having to recompile to test
• Utilize unattended dynamic analysis and batch scripting to test applications under
the control of TotalView in CI/CD
• Find memory leaks and errors during execution
• Analyze how your application is using the heap
• Analysis and debugging capabilities that enable collaboration with team members
• Part of an overall DAST solution
How TotalView Can Help
Learn more at totalview.io
Questions?

More Related Content

PDF
Your Framework for Success: introduction to JavaScript Testing at Scale
PDF
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
PPTX
How to Get Started with DevSecOps
PPTX
DevSecOps-OWASP Indonesia Day 2017
PPTX
Integrating security into Continuous Delivery
PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
Simplify Dev with Complicated Security Tools
PPT
Code Quality - Security
Your Framework for Success: introduction to JavaScript Testing at Scale
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
How to Get Started with DevSecOps
DevSecOps-OWASP Indonesia Day 2017
Integrating security into Continuous Delivery
Implementing an Application Security Pipeline in Jenkins
Simplify Dev with Complicated Security Tools
Code Quality - Security

What's hot (20)

PPTX
Unit testing : what are you missing for security
PDF
Barriers to Container Security and How to Overcome Them
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PPTX
Dev secops security and compliance at the speed of continuous delivery - owasp
PPTX
Building an AppSec Pipeline: Keeping your program, and your life, sane
PPTX
Inflectracon2020: Advantages of Integrating a DevSecOps Pipeline with the Spi...
PDF
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
A Successful SAST Tool Implementation
PDF
Automating OWASP Tests in your CI/CD
PDF
DevSecOps and the CI/CD Pipeline
PPTX
Legal and Practical Concerns with Software Development
DOCX
10 things to get right for successful dev secops
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PDF
Building Security in Using CI
PDF
Devops security-An Insight into Secure-SDLC
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PDF
DevSecOps : The Open Source Way by Yusuf Hadiwinata
PDF
DevSecOps | DevOps Sec
Unit testing : what are you missing for security
Barriers to Container Security and How to Overcome Them
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Dev secops security and compliance at the speed of continuous delivery - owasp
Building an AppSec Pipeline: Keeping your program, and your life, sane
Inflectracon2020: Advantages of Integrating a DevSecOps Pipeline with the Spi...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Succeeding-Marriage-Cybersecurity-DevOps final
[DevSecOps Live] DevSecOps: Challenges and Opportunities
A Successful SAST Tool Implementation
Automating OWASP Tests in your CI/CD
DevSecOps and the CI/CD Pipeline
Legal and Practical Concerns with Software Development
10 things to get right for successful dev secops
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Building Security in Using CI
Devops security-An Insight into Secure-SDLC
Static Application Security Testing Strategies for Automation and Continuous ...
DevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps | DevOps Sec
Ad

Similar to Efficient Security Development and Testing Using Dynamic and Static Code Analysis (20)

PDF
5 Ways to Accelerate Standards Compliance with Static Code Analysis
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
PPTX
Static Analysis Security Testing for Dummies... and You
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PPTX
How to Use Static Application Security Testing for Web Applications.pptx
PPTX
How to Use Static Application Security Testing for Web Applications
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PDF
Automated Pentesting vs Dynamic Application Security Testing
PPTX
The Dynamic Application Security Testing Process A Step-by-Step Guide.pptx
PPTX
The Dynamic Application Security Testing Process: A Step-by-Step Guide
PDF
Enhancing Security in VAST: Towards Static Vulnerability Scanning
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
DevSecOps
PDF
Automated pentesting vs dynamic application security testing (dast) (2)
PDF
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Shift Left Security
5 Ways to Accelerate Standards Compliance with Static Code Analysis
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Static Analysis Security Testing for Dummies... and You
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
How to Use Static Application Security Testing for Web Applications.pptx
How to Use Static Application Security Testing for Web Applications
[OPD 2019] AST Platform and the importance of multi-layered application secu...
Automated Pentesting vs Dynamic Application Security Testing
The Dynamic Application Security Testing Process A Step-by-Step Guide.pptx
The Dynamic Application Security Testing Process: A Step-by-Step Guide
Enhancing Security in VAST: Towards Static Vulnerability Scanning
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
DevSecOps
Automated pentesting vs dynamic application security testing (dast) (2)
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Shift Left Security
Ad

More from Perforce (20)

PDF
How to Organize Game Developers With Different Planning Needs
PDF
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
PDF
Understanding Compliant Workflow Enforcement SOPs
PDF
Branching Out: How To Automate Your Development Process
PDF
How to Do Code Reviews at Massive Scale For DevOps
PDF
How to Spark Joy In Your Product Backlog
PDF
Going Remote: Build Up Your Game Dev Team
PDF
Shift to Remote: How to Manage Your New Workflow
PPTX
Hybrid Development Methodology in a Regulated World
PPTX
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
PDF
Easier Requirements Management Using Diagrams In Helix ALM
PDF
How To Master Your Mega Backlog
PDF
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
PDF
How to Scale With Helix Core and Microsoft Azure
PDF
Achieving Software Safety, Security, and Reliability Part 2
PDF
Should You Break Up With Your Monolith?
PDF
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
PDF
What's New in Helix ALM 2019.4
PDF
Free Yourself From the MS Office Prison
PDF
Code Quality Management Best Practices
How to Organize Game Developers With Different Planning Needs
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Understanding Compliant Workflow Enforcement SOPs
Branching Out: How To Automate Your Development Process
How to Do Code Reviews at Massive Scale For DevOps
How to Spark Joy In Your Product Backlog
Going Remote: Build Up Your Game Dev Team
Shift to Remote: How to Manage Your New Workflow
Hybrid Development Methodology in a Regulated World
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Easier Requirements Management Using Diagrams In Helix ALM
How To Master Your Mega Backlog
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
How to Scale With Helix Core and Microsoft Azure
Achieving Software Safety, Security, and Reliability Part 2
Should You Break Up With Your Monolith?
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
What's New in Helix ALM 2019.4
Free Yourself From the MS Office Prison
Code Quality Management Best Practices

Recently uploaded (20)

PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
L1 - Introduction to python Backend.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
ai tools demonstartion for schools and inter college
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
System and Network Administration Chapter 2
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
Upgrade and Innovation Strategies for SAP ERP Customers
L1 - Introduction to python Backend.pptx
Odoo Companies in India – Driving Business Transformation.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PTS Company Brochure 2025 (1).pdf.......
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Design an Analysis of Algorithms I-SECS-1021-03
Operating system designcfffgfgggggggvggggggggg
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Odoo POS Development Services by CandidRoot Solutions
ai tools demonstartion for schools and inter college
ISO 45001 Occupational Health and Safety Management System
2025 Textile ERP Trends: SAP, Odoo & Oracle
Design an Analysis of Algorithms II-SECS-1021-03
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
System and Network Administration Chapter 2
How to Migrate SBCGlobal Email to Yahoo Easily
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
How to Choose the Right IT Partner for Your Business in Malaysia

Efficient Security Development and Testing Using Dynamic and Static Code Analysis

  • 1. BILL BURNS, SR. DIR OF PRODUCT DEVELOPMENT & PRODUCT MANAGER, TOTALVIEW STUART FOSTER, PRODUCT MANAGER, PERFORCE STATIC APPLICATION SECURITY TESTING (SAST) Efficient Security Development and Testing Using Dynamic and Static Code Analysis
  • 2. perforce.com2 | © Perforce Software, Inc. Minimize your software risks by identifying and eliminating security vulnerabilities as early as possible to ensure that your code is safeguarded against potential threats. 1 2 3 Secure Development Tools SAST/DAST Secure Development Practices and Minimizing Risk Testing, Vulnerability Remediation, and Validation Techniques 4 DevSecOps – Bake Security into your SDLC Today’s Agenda
  • 4. perforce.com4 | © Perforce Software, Inc. Known as white box testing, SAST allows developers to find security vulnerabilities in application source code early in the SDLC. The tool also helps enforce coding guidelines and standards throughout the development life-cycle. What do SAST tools test? • The tools tools test the source code, byte code, and binaries line-by-line, to expose weaknesses in the software before it is deployed. • By detecting coding violations early in development weaknesses can be fixed before attackers detect them and they become true vulnerabilities in production software. What is Static Application Security Testing (SAST)?
  • 5. perforce.com5 | © Perforce Software, Inc. • Finds issues by looking for known vulnerability patterns for industry coding standards for security, safety, and quality • Speed & cost of remediation is faster/cheaper because of early detection • Shift-Left approach – analysis available everywhere; on desktop, within CI/CD pipelines, and during integration builds • Easy to automate, scalable and provides highest levels of code coverage • Feedback is fast and provides exact location of vulnerabilities, help and reports Advantages of Static Application Security Testing (SAST)
  • 6. perforce.com6 | © Perforce Software, Inc. Known as black box testing, DAST allows developers to find security vulnerabilities and weaknesses in a running application. The tool allows developers to find and validate issues present in pre-and-post- production code. What do DAST tools test? • The tool tests running code to detect issues with interfaces, APIs, scripting, data injection, authentication, and more by using a variety of dynamic analysis capabilities and techniques including: live memory usage and error checking, live and test application recording, and fuzzing techniques to throw invalid and unexpected test cases at the application. • DAST can find runtime problems that can't be identified by Static Analysis – issues outside of the code within third-party interfaces, environment, or configuration issues. What is Dynamic Application Security Testing? (DAST)
  • 7. perforce.com7 | © Perforce Software, Inc. Advantages of Dynamic Application Security Testing (DAST) • Analyze the whole application while it is running • “Look inside” the application and dynamically analyze execution logic and live data • Highlights authentication and server configuration issues • Language and Source Code independent • Checks memory consumption and resource use • Attempts to break encryption algorithms from outside • Verifies permissions to ensure isolation of privilege levels • Checks for cross-site scripting, SQL injection, and cookie manipulation • Tests for vulnerabilities in third-party interfaces • Understands arguments and function calls • Record application execution for post-mortem test failure analysis • Catch hard application failures • Unattended script based dynamic analysis
  • 8. Secure Development Practices and Risk Reduction
  • 9. perforce.com9 | © Perforce Software, Inc. Build Security into your SDLC • Follow Secure Coding Standards • Enforce Security Compliance using Tools • Using both SAST/DAST tools together should be part of every effective security program. • Provide Security Training & Learning for your teams • Incorporate security scanning into your development lifecycle Secure Software Development Practices Plan Code Build Test Release Deploy Operate Monitor SAST DAST
  • 10. perforce.com10 | © Perforce Software, Inc. Minimize Security Risks DASTSAST Code Written Code Submitted Analyses for Secure Coding Issues Tests for Security Issues Validates SAST Issues Pass, or Issues Deferred Pass, for Release Fail, and Report Issues Remediate / Fix Issues Synthesize / Correlate Data from Tools SAST – Detects vulnerabilities and lists severity of issues found DAST – Validates SAST findings, informs further prioritization, uncovers run-time issues As part of an effective security program both SAST and DAST should be used together. DAST tools can be used to identify valuable SAST rules to enforce and help prioritize the vulnerability backlog when dealing with existing production code. SAST can be used to uncover issues pre-production and new development on existing code with DAST complimenting the validation and verification checks before a product is released.
  • 12. perforce.com12 | © Perforce Software, Inc. 1. Klocwork Scan of git source code reveals an “Unvalidated integer value ‘len’” error. 2. Variable len is set on line 178 and then used on line 180. 3. Help from KW explains problem and suggested resolutions. • This could result in a buffer overrun of buffer “input”. • Use Dynamic Analysis to analyze and confirm the fix. Static/Dynamic Analysis Example – Klocwork Analysis 2 3 1
  • 13. perforce.com13 | © Perforce Software, Inc. Static/Dynamic Analysis Example – TotalView Analysis
  • 14. perforce.com14 | © Perforce Software, Inc. • Several Dynamic Analysis/DAST tools may be needed to provide full coverage • TotalView provides more than just interactive debugging • Reverse Debugging enables one-session recording, analysis, resolution and ability to save recording files • Memory debugging to find memory leaks and other heap memory errors • TotalView can be fully scripted and run in an unattended mode • Ideal for integration into CI environments • Supports reverse debugging and memory debugging technologies • Catch application crashes and save off core files and reverse debugging recording files • Compare test results against baselines to validate platform, compiler and toolkits TotalView Dynamic Analysis Capabilities
  • 16. perforce.com16 | © Perforce Software, Inc. • Creating a secure Software Development Life Cycle (sSDLC) is one of the best ways to enforce development best practices. • Ensuring development velocity while delivering secure code is possible when application security testing is built into the DevOps workflow. The most efficient and effective solution is to use Dynamic and Static Code Analysis for application security testing within DevSecOps pipelines. • Incorporating a shift-left approach into DevOps means integrating AST tools early and running often throughout the development process. • By continuously monitoring and enforcing security compliance you can; • Use SAST/DAST to find vulnerabilities and threats in your code • Perform pre-commit, commit, build integration, testing, and production checks throughout your entire development pipeline • Receive reports on issues and correlate data to make informed decisions to prioritize and mitigate risks in your code DevSecOps
  • 17. perforce.com17 | © Perforce Software, Inc. Example CI/CD Workflow
  • 18. Application Security Testing S E E A L I V E D E M O AT perforce.com/products/klocwork/live-demo S E E A D E M O AT totalview.io/demo
  • 19. perforce.com19 | © Perforce Software, Inc. • Find Security, Quality and Reliability defects early in the SDLC – Reduce costs and limiting production defects • Enforce security, quality or safety standards • Shift-Left Defect Analysis – Desktop, CI/CD, Server • Provide detailed defect information and remediation help & best practices • Recommendation engine that helps identify and prioritize issues based on severity of risk • Command, Control and Collaboration – Monitor Projects, Manage Defects, Report and Track Project Status • DevOps/DevSecOps – Supports Containers, CI/CD, Cloud Services, Provisioned instances, REST APIs • Accelerate development velocity and delivery cycles • Certified tool for compliance and functional safety development • Enterprise at scale – Large Code bases, Multi-Language Support, Support for Thousands of developers, Broad Toolset Integrations How Klocwork Can Help Learn more at perforce.com/klocwork
  • 20. perforce.com20 | © Perforce Software, Inc. • Dynamically analyze your code to understand how it actually runs and generates data • Use reverse debugging to go backwards and forwards in your code during one analysis and debugging session • Leverage evaluation points to add hot-patches to your code and validate a fix without having to recompile to test • Utilize unattended dynamic analysis and batch scripting to test applications under the control of TotalView in CI/CD • Find memory leaks and errors during execution • Analyze how your application is using the heap • Analysis and debugging capabilities that enable collaboration with team members • Part of an overall DAST solution How TotalView Can Help Learn more at totalview.io